{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:57:06Z","timestamp":1772121426327,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838229","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T19:03:46Z","timestamp":1406574226000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Identity access management for Multi-tier cloud infrastructures"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Faraji","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Joon-Myung","family":"Kang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hadi","family":"Bannazadeh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alberto","family":"Leon-Garcia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/IWISA.2010.5473670"},{"key":"22","author":"foundation","year":"0","journal-title":"Openstack Keystone Architecture"},{"key":"17","article-title":"From abac to zbac: The evolution of access control models","volume":"21","author":"karp","year":"2009","journal-title":"Hewlett-Packard Development Company L"},{"key":"23","author":"halili","year":"2008","journal-title":"Apache JMeter"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CSSS.2012.354"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35508-5_1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971967"},{"key":"11","article-title":"Beyond virtual data centers: Toward an open resource control architecture","author":"chase","year":"2007","journal-title":"Selected Papers from the International Conference on the Virtual Computing Initiative (ACM Digital Library)"},{"key":"12","author":"steve schwab","year":"2012","journal-title":"Managing Identity and Authorization for Community Clouds"},{"key":"21","first-page":"664","article-title":"SAVI testbed: Control and management of converged virtual ICT resources","author":"kang","year":"2013","journal-title":"IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013)"},{"key":"3","author":"anderson","year":"2006","journal-title":"GENI Global Environment for Network Innovations Distributed Services Working Group"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/775427.775431"},{"key":"2","first-page":"664","article-title":"Savi testbed: Control and management of converged virtual ict resources","author":"kang","year":"2013","journal-title":"Integrated Network Management (IM 2013) 2013 IFIP\/IEEE International Symposium on"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385323"},{"key":"7","article-title":"Identity management in cloud computing-A review","volume":"1","author":"gunjan","year":"2012","journal-title":"International journal of engineering"},{"key":"6","author":"angin","year":"0","journal-title":"An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing"},{"key":"5","first-page":"77","article-title":"User centric identity management","author":"j\ufffdsang","year":"2005","journal-title":"AusCERT Asia Pacific Information Technology Security Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSS.2010.46"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICFIN.2009.5339583"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","location":"Krakow, Poland","start":{"date-parts":[[2014,5,5]]},"end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838229.pdf?arnumber=6838229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:44:11Z","timestamp":1490298251000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6838229\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838229","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}